In a recent article about computer storage formats, I mentioned that USB enclosures for NVMe M.2 hard drives were not widely available. We have since been able to to obtain a demo board for the JMS583 USB 3.1 gen 2 to PCIe bridge from the fine folk at JMicron. We have been using this adapter to do some testing with an NVMe SSD...

After a successful assessment by UKAS in June, CCL are pleased to announce that our accreditation to ISO17025 and the Forensic Science Regulator’s Codes of Practice and Conduct has been renewed, we have transitioned to the 2017 version of ISO17025 and our extension to scope for tablets has been granted. We are delighted with this result. For full details of...

In the 4th Century BCE, a Macedonian courier rode into Sparta with a message from his king: “You are advised to submit without further delay, for if I bring my army into your land, I will destroy your farms, slay your people and raze your city.” The Spartan ephors sent the courier back to King Philip with their response: “If.”...

As the volume of data has grown exponentially, the need to manage, analyse and integrate data has become a critical requirement for investigations and security applications alike. Our understanding and experience with large and diverse data sets, and challenges of ingesting, analysing and deriving intelligence from this data, means that we can support clients with the technical, procedural and training...

All activity which takes place on an electronic device has the potential to leave behind a trace of what the user has done. CCL can support you with the most complex digital forensics investigations including counter terrorism, serious organised crime, child abuse, major investigations and much more. We hold one of the widest ranges of accreditation of any UK digital...

Recently a colleague of mine was diving into the Facebook application on Windows 10 when they noticed something odd: plist files. For those of you not in the know, plist or “Property List” is a data format used widely across Apple devices, both desktop and embedded devices running iOS and the like. They are widely used to hold configuration information but are often used as a more general data...

I was chatting recently with some of our newest members of staff (We're hiring.) about various computer storage and transfer technologies, new and old, such as IDE, NVMe and UASP. There were a lot of abbreviations in that conversation. There are three in this paragraph! This blog post is all about the form factors, interfaces and protocols used by some...

CCL has been providing cyber security services and solutions to our clients since 2002. Underpinned by our deep knowledge of computer forensics, we can expose cyber vulnerabilities in your business that may have been overlooked. We will externally validate work that has been done to date on a cyber strategy, from both your internal resource and your external IT providers,...

Digital evidence and disclosure day We are delighted to announce the success of our digital evidence and disclosure day held on July 3rd, held for delegates from Law Enforcement & the Crown Prosecution Services, hosted in our training academy based at our Head Office in Stratford-upon-Avon. The seminar focussed on how to manage the risk around the proper examination of...